In this guided exercise, you will apply what you have learned to create and share a secret key with a second user. You will then assume the role of the second user and use the secret key to send an encrypted message to the first user. Finally, you will re-assume the role of the first user and decrypt the second user’s message. For the purposes of this exercise, the first user is named cybrary and the second user is named john.